Quantum computers are coming; and with that some traditional cryptography is not considered sufficiently strong. Even though there are still many years until quantum computers are expected to be ...
Abstract: Conjunctive keyword queries on untrusted cloud servers represent one of the most common forms of search in encrypted environments. Extensive research has been devoted to developing efficient ...
Abstract: While existing graph clustering methods can only be oriented to classical graph data, this study, as the first attempt, focuses on the proposed symmetric-tensor based graph and its ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results